[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

ITT your favorite password. I'll start: 7qST8LekuxWdF8

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 193
Thread images: 9

File: password_580-100022344-large.jpg (74KB, 580x388px) Image search: [Google]
password_580-100022344-large.jpg
74KB, 580x388px
ITT your favorite password. I'll start:

7qST8LekuxWdF8
>>
1q2w3e4r5t
>>
omghax
and
fagwithaidz
>>
anglebluesuggestedsimpleafterdeveloped
>>
waiters
Waiters
waiters1
Waiters1
Waiters1!

I used to be a waiter a long time ago.
>>
123456
>>
asdfjkl; is my favorite.

or asdfasdf
>>
hunter2
>>
WelcomeToTheBotnet.
Guess what I use this one for.
>>
>>45514772
123454321
>>
>>45514772
nice try NSA
>>
File: 1380152285046.png (64KB, 236x214px) Image search: [Google]
1380152285046.png
64KB, 236x214px
P@ssw0rd
>>
>>45514772
Those kind of passwords are easier to crack than using plain text phrases like 'the quick brown fox jumped over the lazy dog' etc.
>>
Coming soon:
>ITT your favourite user names.
>>
>>45514913
NOPE
STOP BELIEVING THOSE LIES FFS
do you know what a dictionary attack is?
do you know, what a hashtable is?
>>
nirsoftsearch
>>
op i just haked ur phone and router u beter watch out dude im going ddos u so bad

we do not forget
we do not forgive
we are legion
exepct us
>>
>>45514860
Dank reference bruh
>>
>>45514928
anon
lolibelly
wwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww
>>
420
>>
>>45514913
>thequickbrownfoxjumpedoverthelazydog
Remember you don't want spaces in your passwords, ever
>>
>>45515137

why?
>>
>>45514938
a dictionary attack cannot attack a long phrase like that quickly.
>>
correct horse staple battery
>>
Smashthestate
>>
'nwdd'2mc9'lg3d'9lhi'edev'
>>
>>45514913
wrong, retard.

>>45515137
wrong, retard.

>>45515160
wrong, retard.
>>
>>45515183
Best ITT
>>
https://www.freerainbowtables.com/
>>
*******
>>
File: password_strength.png (91KB, 740x601px) Image search: [Google]
password_strength.png
91KB, 740x601px
>>45514938
>>45515222
>These faggots don't read xkcd
>>
>>45515222
How many words are there in english? Let's say it's 3000. The common alphabet has only 26 letters. Now what would be more effective, every variable being a word or just a letter?
>>
>>45515222
wrong, retard.

>>45515222
wrong, retard.

>>45515222
wrong, retard.
>>
>>45515314
Does that actually work
>>
>>45515314

>people not realizing this comic is bait
>>
>>45515350
>Greentexting instead of prooving the comic wrong

Try harder next time.
>>
>>45515339
Not as well as the comic makes you believe. Actually using both phrases and weird symbols is much better.

Co0rrect hoR$e b4tTery—staple!!1oneoneone is much better
>>
>>45515339
It does.
>>
>>45514891

The NSA already has your passwords, but they don't need them anyway.
>>
>>45515320

Whats higher, 3000^4(4 words) or 62(a-z, A-Z, 0-9)^16(ave length of four short words)?
>>
>>45515400
That doesn't make it any easier to remember. It only makes a complex password longer to type out.
>>
Everything posted in this thread has been added to the most popular dictionary cracker.
>>
>>45515453

I am pretty sure "wrong" and "retard" are already in its dictionary.
>>
>>45515429
3000^4 = 8.1e+13
62^16 = 4.7e+28
>>
File: 221.jpg (38KB, 500x333px) Image search: [Google]
221.jpg
38KB, 500x333px
>>45515314
what if somebody targeted these types of passwords with their cracking software? How easy/heard would it then be? They would probably use 20k most common english words and try all combinations.
I think that people who are writing software for password cracking are not stupid.

Just imagine they targeted 10k most common english words. That's 10^4. connecting 4 words is then 10^16, and not to mention that it's going to be less than that statistically.

Not saying I'm definitely right, just thinking about it.
>>
I usually put ñ in my password. It increases the strength by thousands of billions of h4x0rohms
>>
i do passwoord, then add the first letter of the website name to the end to make it unique to each site.
>>
>>45515497
does it work on every site/service/program/app?
I try to avoid those characters for that reason.
>>
>>45515496
Either way. Brute forcing is just stupid and a waste of time.
>>
nsaplsgo
>>
>>45515339
Yes. The problem is most people are retards with a 200 word vocabulary. If you randomly pick from a large enough vocabulary pool (best if you use foreign languages as well), it's much stronger than a regular "pick a word do common symbol substitutions add a few numbers" ones every grandma and their dog has.
>>
Favorite password?

Scott really irritates me.
>>
DoYourHomeworkMatt

That's what I change the wifi password to when my son doesn't do your homework. So when he asks me what the password to the wifi is I tell him the truth.
>>
File: 1416174607805.png (1MB, 1000x669px) Image search: [Google]
1416174607805.png
1MB, 1000x669px
>>45515529
It depends, but mostly works, yes: If not I know I'm in obangobongo.nig and leave as quickly as my alt+F4 can summon the interrupt
>>
>>45515496

One word of a 20k dictionary has about the same strength as 2.5 characters when using a-z, A-Z and 0-9.

So 4 dictionary words are equal 10 characters, which is a strong enough passwords for most purposes.
>>
I usually use my name with a slight variation. Like N4me463 or N3me729. If someone who knows me were to try to hack them, they would need to know the username as well and also most sites would have a mechanism to stop the hammering. If a random guy tries to get it from a leaked hash file, then I suppose he'll get it if he's going to guess long enough.
>>
redkangarooinpurpledrageatslettuce
>>
>>45515560
Fuck you nigger
>>
File: 1415282624619.jpg (41KB, 400x400px) Image search: [Google]
1415282624619.jpg
41KB, 400x400px
>>45515560
who the fuck is this
>>
>>45515314
>>45515496
yes, brute force dictionary crackers
toss in a random character instead of a space and suddenly you exponentially grew its improbability of being cracked.
>>
>>45515496
And a simple unexpected letter between the words will make everything even more complex. Not much harder to remember correcthorse-batterystaple or correct!horsebatterystable
>>
>>45515590
somewhat, yes. Even though idk where did you hear about calculation for 2.5 chars, and if no numbers then - boom, much easier.
Again - I'm just guessing, but it doesn't look like it protects more than that first password on xkcd comic.
>>
>>45515496
Now imagine someone uses a dictionary of 40k English + 40k other language words, and uses 5 words. Bam, 81 bits of entropy.
>>
File: 1385437267871.jpg (66KB, 800x642px) Image search: [Google]
1385437267871.jpg
66KB, 800x642px
>>45515339
Consider that your normal choice of letters/number/signs in a password consist of A-Z a-z 0-9 + maybe 10 special chars, so 26+26+10+10 = 72 characters. That is the optimum with a conventional password, so for each characters in your password you have 68 different possibilities, theoretically. So assume you have a completely random password (which most people don't have) with 8 characters; it would have 72^8 = 7.22 * 10^14 combinations. Practically it is way less as you don't use passwords solely consisting of lowercase or uppercase characters, and so on. But let's go with that number anyways.

Now assume, instead of these characters, you use the english alphabet as single characters. Each word represents one character: the english alphabet consists of over 100.000 words, and this doesn't even include names. Now let's assume the average person maybe knows 1/4 of that, so 25.000 words which are possibly used for the password. In the example the person chose 4 random words, that is 25.000^4 = 3.9 * 10^17 combinations. Add one word to it, makes 9.76 * 10^21 combinations. All this assumes that the attacker knows that you're using words, of course. If he has no knowledge of this, it is pretty much impossible for him to crack the password (You can do the math yourself)

So with very little effort you can make an easy to remember complex password using words. As long as you don't limit your vocabulary on certain things that could easily be predicted, this method is very safe.
>>
check
>>
>>45515724
Unsecure trips are crackable, you know. Better not try putting your password in there anon, I know you're going to do it.
>>
>>45515724
>>
>>45514772
Letter letter symbol number symbol letter number number symbol letter letter letter whole word number number symbol symbol letter number symbol

Every other character is pressed with shift.

No i wont give out what any of them actually are.
Have fun cracking shit like that with your dictionaries.
>>
>>45515691
I wish. The problem is that most sites don't allow you to use more than a certain number of characters. Mostly around 16, many only 8 and the best fucking example is my bank that only allows 5(!) character passwords for the online banking login.
>>
Password not found
>>
mine is hackuntaco
>>
>>45515339

>not making it C0rR3cT h0R5E B@t7ErY S7@PL3
>>
my favorite is
corhorbat'); DROP TABLE USERS;
>>
>>45514772
gentoo
>>
TAEMXrTNv8OrgophiZ5b
Standard 20 length random.

>>45515984
kek
>>
>>45515339
Consider this:
If you have two digits, with two possible variations for each digit, you'd end up with 4 possible variations in total, right?

00; 01; 10; 11

Now if had 4 digits, with two possible variations for each digit, you'd have 8 possible variations in total?

001; 011; 111; 101
000; 010; 110; 100

Now if you have 4 digits it would be 16, correct?

0011; 0111; 1111; 1011
0001; 0101; 1101; 1001
0010; 0110; 1110; 1010
0000; 0100; 1100; 1000

Having said that, I guess the amount of total possibilities doubles with each additional digit. 4, 8, 16, 32 etc. So what happens if you increase the amount of variables per digit?

00; 01; 02; 10; 11; 12; 20; 21; 22

You'd get 9 possible varations with two digits. But with an additional digit the amount of possiblities triples:

000; 010; 020; 100; 110; 120; 200; 210; 220
001; 011; 021; 101; 111; 121; 201; 211; 221
002; 012; 022; 102; 112; 122; 202; 212; 222

So you get 9, 27, 81 etc. But 4 digits with 2 possible variations would generate 16 variations in total where two digits with 3 possiblities per digit only generate 9 variations. I think this means that a 4 digit password, with two possible variables per digit, needs more guesses than a two digit password with 3.

Now having established that, what about a password with 26 possibilities per digit? I suppose it would need 26 times as many guesses per additional digit. If you add numbers you'd get times 36 per digit.

26 x 26 x 26 x 26 = 456976
36 x 36 x 36 x 36 = 1679616

but

26 x 26 x 26 x 26 x 26 = 11881376

This indicates that additional digits add more possible variations than adding more variations per digit. At least if you compare letter vs letters with numbers. If you add special keys you might get a more secure password, with the same amount digits, but a row of random words provides more variations if it contains a few more digits.
>>
>>45514772
eye h@te n1ggers
>>
I pick four random words from my native language then type them in an english keyboard for a password.


I am not only one right?
>>
>>45516318
That actually sounds kinda smart. I'm stupid though so I'm not sure if that means anything.
>>
>>45516318
Well you probably won't be a target incase you're part of a database leak or something. But for a targeted attack on you, it may be different
>>
>>45516334
>>45516318
Btw. I having an idea. What if you had a random/custom overlay or something for your particular keyboard? You're password in plain english but then you're just punshing the letters on the overlay.
>>
I use maximum length, random characters. I don't remember my passwords. I use password recovery every time I want to log in, then reset my password to a new random password. This was even if my brain is compromised by some sort of novel brain wave scanner my accounts are still safe.
>>
>>45516424
I'd assume that if they have access to your brain, they can also read out those informations from your computer.
>>
>>45516421
Maybe you wouldn't even need to change your password technically but just retype it with a switched up overlay.
>>
>>45516418
Well, I considered that it is not that different to >>45515314 but it is much easier to remember.
>>
PA$$WORD
>>
>>45514860
underrated post
>>
>>45516424
>>45516439
I cant find the study anymore bu i remember a study being done by some phds that were attempting to forgo character passwords entirely by hooking up some kind of scanner to a program connected to your pc that would relay a specific puzzle or song to play(guitar hero style) and based on the way you solved it would register certain activity in your brain and recognize that neural activity as you or not you

seemed pretty crazy and bad ass I wonder if that will ever be possible
>>
wemajor1
>>
>>45516523
Wouldn't there be a certain rhythm to your password? I mean like the way you punch it in.
>>
Chimeric911Horse2236
>>
>>45516442
Wouldn't just using a password manager be easier?
>>
hunter2
>>
>>45516602
What do you mean?
>>
>>45514772
>ITT your favorite password. I'll start:
>
>7qST8LekuxWdF8

All of mine look like that. 25 characters minimum. Different for every single site I go to.

Is it hard? No, I use a password manager.
>>
>>45516713
wat if ur password manager is die
wat then motherfacker
>>
>>45514772
>15 chars short
>no special characters

It's like you're asking to get hacked.
>>
>>45515429

Ding ding ding.

xkcd can go fuck itself.
>>
>>45516732
>wat if ur password manager is die
>wat then motherfacker

It's called exporting to .csv and storing it somewhere safe.

Are you really this stupid?
>>
31537359432181
neetaddict8134
necci44472
sex3315 (I was young)
>>
AzunyanIsMyWaifu
>>
>>45514772
ITT: /g/ helps OP build a password list.
>>
>>45515429
Shouldn't ^x have the same value?
>>
>>45516583
Ive been looking this whole time and cant find the study sorry

but it was some sort of puzzle game that had mutiple outcomes and the goal of the program was to scan certain regions in you brain and record the reactions to those types of stimuli

>>45516583
>Wouldn't there be a certain rhythm to your password

im assuming the rythem would be your brains natural activity/communication

they said it took several hours to set it up to recognize yourself then you had to create the password/puzzle reactions sounded pretty sweet bc theoretically

even if someone out a gun to your head and you tried to solve the puzzle deal and sign in or whatever the brain scan would register an "occurrence" past a certain threshold and not work
>>
>>45516827
this.
>>
>>45514909
>Patssword
>>
>>45515314
>this faggot blindly trusts what he reads in a webcomic online
>>
File: xkcd parody 2.jpg (96KB, 674x789px) Image search: [Google]
xkcd parody 2.jpg
96KB, 674x789px
>>45515314
>he does
>>
>>45515903
I like you
>>
Usually about 3-6 words vaguely related to type of site it is. Some have caps, and theres diff punctuation between.

At end i have 5 digit code which is related to the preceding words.

I.e.
Shitpost:fit,tech&travel!=84736
>>
>>45515314
Always thought that was such bullshit. I mean it's good point that a lot of people overlook the idea of using a phrase or sentence instead of a simple word, but the whole "this is so much easier to crack!" seems to imply that the attacker already pretty much knows what your password is before he starts. Most people aren't going to waste that much time on a dictionary attack with so many mutations because it gets to the point where you're better off just running random characters, after all you don't even know this guy used a dictionary word as a basis to begin with.
>>
>>45520156
Also find it questionable that he says that a hash being cracked isn't what the standard user should worry about. Isn't that pretty much the entire point of a secure password these days? So that that one insecure website that got hacked doesn't give the attacker access to all your other shit that you stupidly used the same exact password for. Does anybody actually even bother with remote brute forces anymore?

Seems like almost every site puts retardedly low rate limits on password tries anyway. Like seriously why the fuck should I get locked out after 6 invalid attempts? Why not give me a hundred attempts? What if I use more than 6 passwords regularly and can't remember which I used for that site, since I haven't logged into it in months?

Fucking shitheads.
>>
1975Graceandmercyshewn1975
>>
two of the model numbers of my prebuilts in the early 00s in sequence
>>
>>45514860
******
? what do you mean?
>>
God, sex, love , secret
>>
my passwords are all pretty simple as i pre-hash my paswords

they're mostly just the same secure-ish password plus the name of the site/service

the only thing I'm vulnerable to is my PC being compromised/being keylogged, but then again so is everyone

depending on how the keylogger works it might not even capture my passwords as my inputs are filtered as I type them, and they'd only get the resultant hash
>>
>>45514772
0p1s4f4gg0t
>>
ga254pwal7
>>
>>45516761
>wat
>ur
>is die
>motherfacker

Doubt it, aspie.
>>
fuckyouifyouarereadingthisitguy
>>
swordfish
>>
>>45515429
>implying the latter is as easy to remember as the former or any normalfags will ever use the latter instead of just a single long word with 'a' replaces with '@'
>>
Thanks for the new additions to my attack dictionary, faggots.

Regards, the NSA.
>>
>>45514772
This anon has been saving all the emails from the 1+1, and other invite threads and now that he/she/it has a sizable list of emails he/she/it wants a list of matching passwords.
>>
>>45514772
********************
>>
286755fad04869ca523320acce0dc6a4
>>
>>45520439
>normalfags
>"hahahaha im so uniqqeeee!! XDD"
>>
lol Englishfags, not having passwords like the following:

γαμώτιςμάνεςσας
gamwtismanessas
>>
>>45520439

>referring to people with bad memory as "normalfags"

ok kid, you're clearly new as fuck to the internet and have no idea what that word actually means
>>
>>45521710
STOP BOMBING SYRIA
GET THE FUCK OUT OF PALESTINE ALREADY
gb2/oven/
>>
Reminder that anything other than Pa55w0rd is objectively wrong.
>>
p8h77-mLe
>>
>>45514772
niggernauts in france
>>
>>45514772
Think bule count one tow red shoe
>>
>>45521729
>implying I'm a Jew

>implying I'm not :^P
>>
yu&I8R7£yu&I8R7

r8
>>
>>45514772
1fuck3durm0m
>>
>>45514772
OPisafaggot
>>
Pa$$word
>>
conficker!123456

was very amusing when i was showing some IT director the issues with some work program and he asked to log in as me

director or not my first thought was my password? no way

but then i figured it'll be worth a giggle

>conficker exlamation 123 456
>boss: what?
>conficker
>exclamation
>123 456
>boss: whats the first bit?
>conficker. like compfucker but its con... f-i-c-k-e-r
>boss: ....
>hello? still there?
>>
>>45514772
P0\/\/3||D4|\|13|J4(k
>>
>>45514772
>no unicode characters
8ɯ⇂ǝɔıu
>>
Sw0rdf1sh
>>
>>45515429
>62
ascii nigger it's 92 ^ 16 and according to google there are just over a million words, use a word at random and your possible combinations go to 1000000 ^ 4
who's bigger now nog
>>
jwtfnniuwavtakwjtg
lpqzqgezucveum
uezmgaqhciniebbnvz
wpzuxeyzogeimtpaydnli
A3EILM2S2Y (this should be familiar to anyone who played Parasite Eve 2)
>>
1234@abcD
>>
>>45523852
lets do some simple rounding because I'm a lazy prick
if its' 92 ^ 16 we can just round it to 100 ^ 16 which is 10^32
1000000 ^ 4 is 10^24
so the needlessly long second password equals less brute force guesses
HOWEVER
using a modified dictionary attack against the random words yields that amount while using a modified dictionary attack against every word in english yields 1000000 + modifications, lets assume it's an average of 20 modifications per word, substituting every letter for a capital and fitting number and adding in some special characters we still get 1000000 * 20 which is only 20,000,000

so 20,000,000 combinations vs 10^24

you do the math
>>
>>45514772
Pn3um0n0ULt|24M1(|205C0P1(51L1C0V0LC4N0C0N10515
>>
>>45514772
Pn3um0n0ULt|24M1(|205C0P1(51L1C0V0LC4N0C0N10515
>>
I remember that my high school was using
zaq1@WSX
. It's easy to type on QWERTY and easy as hell to see when somebody is typing it.
I hope they changed it.
>>
>>45514772
Pn3um0n0ULt|24M1(|205C0P1(51L1C0V0LC4N0C0N10515
>>
>>45514772
IchFickDeine300KiloMutter!
>>
>>45514849
i usually do that one but with a capital 6
>>
>>45521729
עברית לא נראת ככה בכלל.
>>
>mfw passwords with ' and > and < sometimes get escaped by website HTML parsers
>mfw impossible to log in because it was registered as > but always get converted to &gt when logging in
>>
>>45520350
I really, really like this post.
>>
>>45514772
HWDPjebacPSY123
>>
>>45524428
nigga what
>>
File: 1413209722630.jpg (9KB, 207x200px) Image search: [Google]
1413209722630.jpg
9KB, 207x200px
>>45514772
I no understand ta meaning of which you speak of
>>
[lenny face]

Imagine copypasting it every goddamn time

>>45524548 poland pls
>>
IloveinstallingGentooalldayeverydaywithmyboyRichardMStallman,/g/
>>
imurderedvictoriawithahammer

passwords aren't subject to 5th amendment protections bur confessions to crimes are. ergo, your password should confess a crime.
>>
H4ckC0mplet3d!
>>
>>45514772
muchpasswordverysafewow

and

peanutbutter246
>>
I like boobs
>>
>>45524756
So then the ideal password for /g/ would be SodomyIsFun! ?
>>
Why do people think something like:

d41$lhA0b3@

is more secure than an equal number of random lowercase letters?

Surely the cracker would need prior knowledge to be able to use the fact it's all lowercase to his advantage?
>>
1337
>>
nigg3rNiGGernigg4rniggr
>>
GNUNUNUNUNUNUNUNUNU
>>
ýÈô!ìÂ*O>L·qÙ¶/fw÷4ú
>>
>>45514772

wow I thought jagex blocks ur password
>>
>>45514928
LOOL
>>
>>45514772

Ù^*ì¤ÿõ*ª¦`nKù^¦¼-cM"|íwþ¤¬äaÍY}s1WS½+ÞÖé!3qÁæògy_å§æ'>ÈÑÊWuÐÑÕb°»]&Þ:e3ÕÑ0XĸêL'ý^7,îtþopN}ÙdE05õQx8d¦rI£á~pV,4Î>`609=éýÄ$ÎxªOÃð&¥QVôbbå!qî$¯åã§år§÷'å¥A,4«§êxýéÃ=HyϨmº¼nßceF\í?¸¦0|mqê~'Tw`¬=<{½Í½û½aûé^àg25â×=ÿâ§Grkî5^µ·$IÕl«H[Ëk\©ÖʨÆÞ~åõ\Ï©UK¡m*tv?_ò¨Ö|<q3Ås%2êqtÒÛM÷ùk¬&êÂF´dJ-ÝÚvî¨ÓVèÞ>ýheLqÍozX¯«ÍëCih3G¦xݽ'½zI$îõ¯':ÈÇÙÚXèåé¯jvf{u1·umh=¢

bless passwordmanagers
>>
>>45514772
notthistimensa
>>
4d3d3d3
>>
>>45530544
you don't fear encoding issues do you ..
>>
pa$$w0rd
>>
>>45531034
>2014
>not keeping your important data on papers
I'm still waiting for the NSA to develop a technology to hack and spy my notepad...
>>
>>45514772
niggerloverA1!
niggerdickA1!
niggerstonguemyagnusA1!

works everywhere
>>
W Szczebrzeszynie chrząszcz brzmi w trzcinie
>>
>>45514772

qaz

easy as fuck to type and remember for dumb shit I wouldn't mind being compromised.
>>
TightestpussyInTokyocity24/7
>>
>>45514772
I use "1" as my password on sites that allow small passwords because it's so simple people would never expect anyone to use it. I've only had my account hacked a few times so it's pretty good so far.
>>
>>45514772
THX_1138
>>
>>45528648
that guy is lying, look, here's mine!
nicemaymaym8
See, blocked.
>>
>>45514772
9852174563

[spoiler]Nobody must know my secet[/spoiler]
>>
I still have my old wifi password memorized, which was just a random string of 28 letters and numbers. I still use it occasionally for accounts that are most important to me.
>>
bigboobz
>>
n1ce_try_ns4
>>
>>45518104
someone's maximum butthurt
>>
3.14159265359
Thread posts: 193
Thread images: 9


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.